Skip to main content

Abstract

It has been detected that the existing Differential Fault Analysis needs to modify the Advanced Encryption Standard for easy key retrieval process. The attack of DFA on the AES-128 requires a massive amount of faulty ciphertext pairs. Key retrieval using DFA attack on AES-128 requires minimal of 250 pairs of faulty cipher-text. This can be reduced to 14 to 16 pairs of faulty cipher-text samples in AES-192 bits and AES-256 bits. This was done by injecting faults randomly into the 11th cycle key which is saved in the Static RAM-Random Access Memory. Researches are made on methods for finding the initial key and that has only been suggested in AES-128. This paper puts forward a system which, intends to induce DFA attack on AES-192 and AES-256 algorithms with less number of faulty cipher-texts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abraham, N.E.: FPGA implementation of SubBytes & inverse SubBytes for AES algorithm. Int. J. Sci. Res. Dev. (IJSRD) (2013)

    Google Scholar 

  2. Patel, R., Kanjariya, S.: Design of parallel advanced encryption standard (AES) algorithm. Int. J. Res. Comput. Commun. Technol. 4, 219–222 (2015)

    Google Scholar 

  3. Giraud, C.: DFA on AES. Springer, Berlin (2005)

    Book  Google Scholar 

  4. Liao, N., Cui, X., Liao, K., Wang, T., Yu, D., Cui, X.: Improving DFA attacks on AES with unknown and random faults. Sci. China Inf. Sci. 60, 042401 (2016)

    Article  Google Scholar 

  5. Aromoon, U.: An AES cryptosystem for small scale network. In: Third Asian Conference on Defence Technology (3rd ACDT). IEEE (2017)

    Google Scholar 

  6. Wang, P., Hao, L.: A novel differential fault analysis on AES-128. IEEE (2011)

    Google Scholar 

  7. Patranabis, S., Chakraborty, A., Mukhopadhyay, D., Chakrabarti, P.P.: Fault space transformation: a generic approach to counter differential fault analysis and differential fault intensity analysis on AES-like block cipher. IEEE Trans. Inf. Sec. 12, 1092–1102 (2016)

    Article  Google Scholar 

  8. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. Springer, Berlin (1997)

    Google Scholar 

  9. Bai, K., Wu, C.: An AES-like cipher and its white-box implementation. Comput. J. 59, 1054–1065 (2016)

    Article  MathSciNet  Google Scholar 

  10. Barenghi, A., Hocquet, C., Bol, D.: A combined design-time/test-time study of the vulnerability of sub-threshold device to low voltage fault attacks. IEEE Trans. Emerg. Top. Comput. 2, 107–118 (2014)

    Article  Google Scholar 

  11. Haq, S.U., Masood, J., Majeed, A., Aziz, U.: Bulk encryption on GPUs

    Google Scholar 

  12. Floissac, N., L’Hyver, Y.: From AES-128 to AES-192 and AES-256 how to adapt differential fault analysis attacks on key expansion. In: 2011 Workshop on Fault Diagnosis and Tolerance on Cryptography (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tadepalli Sarada Kiranmayee , S. P. Maniraj , Aakanksha Thakur , M. Bhagyashree or Richa Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kiranmayee, T.S., Maniraj, S.P., Thakur, A., Bhagyashree, M., Gupta, R. (2020). Analyzing DFA Attack on AES-192. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24643-3_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24642-6

  • Online ISBN: 978-3-030-24643-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics